Sciweavers

420 search results - page 55 / 84
» Efficient Implementation of the Orlandi Protocol
Sort
View
MOBICOM
1996
ACM
15 years 4 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
117
Voted
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 1 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
ICNP
1999
IEEE
15 years 4 months ago
Smoothing and Prefetching Video from Distributed Servers
Video prefetching has been proposed recently for the transmission of variable-bit-rate(VBR) video over a packetswitched network. The objective of these protocols is to prefetch fu...
Spiridon Bakiras, Victor O. K. Li
CCGRID
2004
IEEE
15 years 4 months ago
Unifier: unifying cache management and communication buffer management for PVFS over InfiniBand
The advent of networking technologies and high performance transport protocols facilitates the service of storage over networks. However, they pose challenges in integration and i...
Jiesheng Wu, Pete Wyckoff, Dhabaleswar K. Panda, R...
100
Voted
MOBILITY
2009
ACM
15 years 7 months ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...